Business Applications

Manage your business processes more efficiently, increase productivity, and promote collaboration between departments.


IT Systems Management

Holistically and automatically monitor and manage your entire IT environment to get everything under control in less time.

Project Management Solutions &

Service Management

Improve the efficiency, reliability and quality of IT services with a solution that satisfies both users and customers!


Cyber Security

Protect corporate data from external threats by exploiting the defensive and offensive point of view of security experts.



We are committed to supporting various industries by providing essential IT solutions to foster business growth through automation and digitisation of processes.

Do you want to increase your skills?


Discover the courses dedicated to deepening your knowledge of the various NetEye modules, IT security, training new IT administrators, and the Dynamics 365 platform.

/ Cyber Security Training / ECIH – Certified Incident Handler


ECIH – Certified Incident Handler


In these days you will acquire the basic skills to detect possible threats from both current and emerging hackers, learn how to distinguish different types of incidents and learn about risk management methodologies.

Are you an IT security professional? This is the course for you if you want to:

  • learn how to manage and respond to IT security incidents
  • obtain the ECIH-CERTIFIED INCIDENT HANDLER 212-89 certification
  • learn the various types of incidents and risk assessment methodologies
  • be able to create management and response policies with respect to a wide variety of computer security incidents.

For all info and REGISTRATION go to the Dgroove platform.

Course date

On request!


    Thank you for your inquiry and your interest in our trainings. We would like to point out that the data is not disclosed to third parties and is processed by adopting the security measures prescribed by current legislation in order to guarantee confidentiality and the limits set by the directives of the GDPR.